Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6740922imu; Mon, 21 Jan 2019 15:01:30 -0800 (PST) X-Google-Smtp-Source: ALg8bN5Bvo3zkWfjEEo/4pDm9BBkTHB1BWT8CgeRMzwQO8+sqzEbsx/KKIxjJUScbBsH/REKnBAK X-Received: by 2002:a63:9e19:: with SMTP id s25mr29760067pgd.203.1548111690779; Mon, 21 Jan 2019 15:01:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548111690; cv=none; d=google.com; s=arc-20160816; b=hKk9ne/pGYM95x2ZzzDlrOtsDSnm9zroIqlI26hEzc925WhHAy3s8VOJI3U/dtCJmm ls6IWBOYQjEEnqtBesToS1R8uiah8pbFgpwSQxdxxS/82b9bDCe7MJtZ5CduUgQO4E97 uW9g7MOH+esBS0Xz7KnMVB+Hgw50uhPSS2iTin6kEaZPyB1e9GjA6vE3/PzRmUZfJQAh eqS6F9ieVA0W4f/QgNwiHja0ggofgn54Na4sSBhJLBJla7za7tF8Yf7GA6BscnLES5ot JwD+9qwN9LdNdBxILX9WM1KVLS9NxOvx/6Gin6MI24LJ5dCTqvX66xdwWGVWgSyenyO+ ZWZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=TXEGBb/YU0FDf3st3YbgH4YoaAG9FNvvzBQ9XHmNACU=; b=eXClcFEA8zW7jiNaAmLmnprZijjuBdfl2xwjM6Fr3sRZ9NAqzsu/l4RVElnvnZwSCc L4r+AAvYTDHvWZbRYZ6ZXWTkooDmt1TSlm0g7y0RUpmidGZNA808qZlj6RkRrNOsWaIl +W/AauYAKzV4ycDPoEYJzoIaZrVItHh6/iRi8nFSl5Wj5hKERzs/HHjjj/WWorJ1MyM6 Kg3XeMJ9vpSwF1ulTNnbC9MBWVdXtqAPc8kgtQZG5OPEkqhqYx6av2z47m8R/jxkV3Sm yLS24Xl3lflMGL1tH4RPm6jOpArG2KT85bm+DFaiyom/YzNcnoh327NGGk+E7xChXWvE k2Vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c8si13702828pgl.507.2019.01.21.15.01.12; Mon, 21 Jan 2019 15:01:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727791AbfAUW7A (ORCPT + 99 others); Mon, 21 Jan 2019 17:59:00 -0500 Received: from mail.kernel.org ([198.145.29.99]:53058 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727179AbfAUW7A (ORCPT ); Mon, 21 Jan 2019 17:59:00 -0500 Received: from vmware.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9485F2085A; Mon, 21 Jan 2019 22:58:52 +0000 (UTC) Date: Mon, 21 Jan 2019 17:58:42 -0500 From: Steven Rostedt To: Dmitry Vyukov Cc: Zenghui Yu , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , "the arch/x86 maintainers" , linux-trace-devel@vger.kernel.org, kasan-dev , "open list:KERNEL BUILD + fi..." , LKML , Andrey Konovalov , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Christoph Lameter , Mark Rutland , Will Deacon Subject: Re: [RESEND BUG REPORT] System hung! Due to ftrace or KASAN? Message-ID: <20190121175842.0f526757@vmware.local.home> In-Reply-To: References: X-Mailer: Claws Mail 3.15.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 21 Jan 2019 10:36:25 +0100 Dmitry Vyukov wrote: > > BTW, I have bisect-ed and tested for this issue today. Finally it turned out > > that > > bffa986c6f80e39d9903015fc7d0d99a66bbf559 is the first bad commit. > > So I'm wondering if anywhere need to be fixed in commit bffa986c6f80 ("kasan: > > move common generic and tag-based code to common.c"). > > Thanks for bisecting. I think we have understanding of what happens > here and it's exactly this that needs to be fixed: > https://groups.google.com/d/msg/kasan-dev/g8A8PLKCyoE/vXnirYEnCAAJ > And this commit already fixes it. I just got a chance to look at that commit, and I knew exactly what the bug was when looking at the broken commit. And yes, the fix is the correct fix for the issue. KASAN can be triggered by parts of the function tracer that is outside of the recursion protection. If that part of KASAN is also traced by the function tracer, it will cause a infinite recursion and crash the system. Seeing that code that was moved out of the "-pg" removal into a file that is compiled with "-pg" (which is what causes function tracer to trace functions in that file), was going to cause issues. Acked-by: Steven Rostedt (VMware) -- Steve